authelia/internal/authentication
James Elliott 31c5c820f0
refactor(authentication): log ldap warning on startup in rare condition (#2141)
This is so on startup administrators who have a LDAP server implementation that may not support password hashing by default are clearly warned. This only triggers if the disable password reset option is not enabled, we cannot find the extension OID for the Extended Password Modify Operation, and the implementation is not Active Directory. Active Directory has it's own method for this which doesn't advertise an OID.
2021-07-04 15:44:11 +10:00
..
const.go fix(authentication): use passwdmodify oid instead of whoami oid (#2139) 2021-07-02 11:33:10 +10:00
file_user_provider_test.go fix: redis sentinel secret missing (#1839) 2021-03-22 20:04:09 +11:00
file_user_provider.go feat: go:embed static assets (#1733) 2021-02-22 10:07:06 +11:00
ldap_connection_factory_mock.go [FEATURE] Enhance LDAP/SMTP TLS Configuration and Unify Them (#1557) 2021-01-04 21:28:55 +11:00
ldap_connection_factory.go [FEATURE] Enhance LDAP/SMTP TLS Configuration and Unify Them (#1557) 2021-01-04 21:28:55 +11:00
ldap_user_provider_test.go feat(authentiation): check ldap support for extended operations on startup (#2133) 2021-07-02 09:16:16 +10:00
ldap_user_provider.go refactor(authentication): log ldap warning on startup in rare condition (#2141) 2021-07-04 15:44:11 +10:00
password_hash_test.go fix(configuration): lower argon2id default memory requirements (#1762) 2021-03-03 20:19:28 +11:00
password_hash.go refactor(authentication): use crypto constant time compare (#1800) 2021-03-11 12:08:49 +11:00
types.go [FEATURE] Add configurable display name to frontend (#1124) 2020-06-19 20:50:21 +10:00
user_provider.go Move source code into internal directory to follow standard project layout. 2019-11-17 16:30:33 +01:00
users_database.template.yml ci: add yamllint (#1895) 2021-04-11 06:51:00 +10:00